|
Message-ID: <789c42d263addea7489b933bdf268236@smtp.hushmail.com> Date: Tue, 05 Jun 2012 08:30:49 +0200 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: GPU formats vs Test Suite On 06/05/2012 08:24 AM, magnum wrote: > On 06/05/2012 08:07 AM, SAYANTAN DATTA wrote: >> I found that the output of openssl version of pbkdf2 in mscash2(cpu >> version) do not matches with the SSE version of pbkdf2 for salts greater >> than 19 charachters. Since mscash2-opencl is based on openssl version of >> pbkdf2, so I have limited the max salt length to 19 charcters only. >> But the >> file /test/MSCash2_tst.in contains salts upto 22 character. I think >> this is >> the main source of problem. > > How come not a single password is cracked then? A smashed buffer? It > should crack all passwords with <= 19 character salts. BTW you only *have* to fix the buffer smashing (if that is what happens), not necessarily bump the max supported length (although that won't hurt). If you fix it and it ends up cracking 1411 out of 1500 hashes, we'll just instruct the Test Suite that 1411 is a success. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.